


default search action
26th INDOCRYPT 2025: Bhubaneshwar, India
- Ratna Dutta, Luca De Feo, Sugata Gangopadhyay:

Progress in Cryptology - INDOCRYPT 2025 - 26th International Conference on Cryptology in India, Bhubaneshwar, India, December 14-17, 2025, Proceedings. Lecture Notes in Computer Science 16372, Springer 2026, ISBN 978-3-032-13300-7
Classical Algorithms
- Mohammad Ferry Husnil Arif, Muhammad Imran:

On the Classical Hardness of the Semidirect Discrete Logarithm Problem in Finite Groups. 3-20 - Ruby Kumari, Sumeet Saurav, Abhijit Karmakar:

High-Performance FPGA Implementation of a Recursive Modular Karatsuba Multiplier over GF(2m). 21-41
Symmetric-Key Cryptography
- Debranjan Pal, Anubhab Baksi, Surajit Mandal, Santanu Sarkar:

Improved Modeling for Substitution Boxes with Negative Samples and Beyond. 45-69 - Yurie Okada, Atsuki Nagai, Atsuko Miyaji:

Refined Linear Approximations for ARX Ciphers and Their Application to ChaCha. 70-91
Zero-Knowledge and Interactive Proofs
- Tohru Kohrita, Maksim Nikolaev, Javier Silva:

BOIL: Proof-Carrying Data from Accumulation of Correlated Holographic IOPs. 95-118 - Antoine Douteau, Adeline Roux-Langlois:

Rejection-Free Framework of Zero-Knowledge Proof Based on Hint-MLWE. 119-144 - Tao-Hsiang Chang, Jen-Chieh Hsu, Hao-Yi Hsu, Raylin Tso, Masahiro Mambo:

COMPASS: A Compact PASS-Lineage Accumulator with Succinct Proofs. 145-169
Isogeny-based Cryptography
- Daniel Berger:

Smooth Twins for Cryptographic Applications from Pell Equations. 173-193 - Gustavo Banegas, Andreas Hellenbrand, Matheus Saldanha:

Hardened CTIDH: Dummy-Free and Deterministic CTIDH. 194-215 - Tobias Guggemos, Farzin Renan:

Key-Updatable Identity-Based Signature Schemes. 216-238 - Sudeshna Karmakar, Abul Kalam, Santanu Sarkar:

Beyond Sequential Walks: Parallelizing the GA-Dlog Problem. 239-260
Multivariate and Lattice-based Cryptography
- Jacques Patarin, Pierre Varjabedian:

Multivariate Encryptions with LL' Perturbations - - Is it Possible to Repair HFE\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textrm{HFE}$$\end{document} in Encryption? When 0 Makes a Difference-. 263-284 - Anushree Belel, Junji Shikata:

Efficient Identity-Based Inner Product Functional Encryption from RLWE. 285-311 - Komal Pursharthi, Dheerendra Mishra:

Module Lattice Based Constant-Size Group Signature with Verifier Local Revocation and Backward Unlinkability. 312-336
Quantum Cryptography
- Siyi Wang, Kyungbae Jang, Anubhab Baksi, Sumanta Chakraborty, Wei Jie Bryan Lee, Anupam Chattopadhyay, Hwajeong Seo:

New Results in Quantum Analysis of LED: Featuring One and Two Oracle Attacks. 339-364 - Kyosuke Sekii, Takashi Nishide:

One-Time Memories Secure Against Depth-Bounded Quantum Circuits. 365-389 - Anisha Dutta, Sayantan Chakraborty, Chandan Goswami, Avishek Adhikari:

Practically Implementable Minimal Universal Gate Sets for Multi-qudit Systems with Cryptographic Validation. 390-414
Secret Sharing and Cloud Security
- Rittwik Hajra, Subha Kar, Pratyay Mukherjee, Soumit Pal:

Traceable Bottom-Up Secret Sharing and Law and Order on Community Social Key Recovery. 417-441 - Meghna Sengupta:

Beyond Confidentiality: Framing-Resistant Secure Vault Schemes. 442-460

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














